Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Secure Key Establishment
Details
Secure Key Establishment discusses the problems encountered in this field. It also introduces several improved protocols with new proofs of security and covers several variants of the widely accepted Bellare and Rogaway model.
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the BellareRogaway model and the CanettiKrawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the BellareRogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Introduces several improved protocols with new proofs of security Identifies several variants of the key sharing requirement including a brief discussion regarding the key sharing requirement Provides an integrative framework that allows protocols to be analyzed in a modified version of the BellareRogaway model using the automated model checker tool
Inhalt
Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of BellareRogaway and CanettiKrawczyk Models.- An Extension to the BellareRogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in Computational Complexity Proofs for Protocols.- On Session Key Construction.- Complementing Computational Protocol Analysis.- An Integrative Framework to Protocol Analysis and Repair.- Conclusion and Future Work.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09781441946898
- Sprache Englisch
- Auflage Softcover reprint of hardcover 1st edition 2009
- Größe H235mm x B155mm x T13mm
- Jahr 2010
- EAN 9781441946898
- Format Kartonierter Einband
- ISBN 1441946896
- Veröffentlichung 25.11.2010
- Titel Secure Key Establishment
- Autor Kim-Kwang Raymond Choo
- Untertitel Advances in Information Security 41
- Gewicht 365g
- Herausgeber Springer US
- Anzahl Seiten 236
- Lesemotiv Verstehen
- Genre Informatik